Hi all, I used the following command to view the virtual address translation process.
build/X86/gem5.opt --debug-flags=Exec,TLB --debug-file=/home/liyan/Desktop/gem5/m5out/debug.txt configs/example/se.py --cpu-type=TimingSimpleCPU --caches --l2cache --mem-type=DRAMsim3 --num-cpus=1 -c "tests/test-progs/hello/bin/x86/linux/hello" However, I found some strange virtual address such as 0x7fffffffee20 56500: system.cpu.dtb: Translating vaddr 0x7fffffffee20. 56500: system.cpu.dtb: In protected mode. 56500: system.cpu.dtb: Paging enabled. 56500: system.cpu.dtb: Handling a TLB miss for address 0x7fffffffee20 at pc 0x400a55. 56500: system.cpu.dtb: Mapping 0x7fffffffe000 to 0xbd000 56500: system.cpu.dtb: Miss was serviced. 56500: system.cpu.dtb: Entry found with paddr 0xbd000, doing protection checks. 56500: system.cpu.dtb: Translated 0x7fffffffee20 -> 0xbde20. And it(0x7fffffffee20) also appears here(I don't know whether there is any relationship) 56500: system.cpu T0 : @_start+5 : pop rsi 56500: system.cpu T0 : @_start+5.0 : POP_R : ldis t1, SS:[rsp] : MemRead : D=0x0000000000000001 A=0x7fffffffee20 110500: system.cpu T0 : @_start+5.1 : POP_R : addi rsp, rsp, 0x8 : IntAlu : D=0x00007fffffffee28 110500: system.cpu T0 : @_start+5.2 : POP_R : mov rsi, rsi, t1 : IntAlu : D=0x0000000000000001 Then I used following command to check the address in hello.dump file but didn't find such address. objdump -D hello > hello.dump I'm not familiar with the compilation process and work flow of the core. Does anyone know why these address exist? Any ideas are appreciated! Please reply if you have some advice. Thanks in advance! Liyan Chen _______________________________________________ gem5-users mailing list -- gem5-users@gem5.org To unsubscribe send an email to gem5-users-le...@gem5.org %(web_page_url)slistinfo%(cgiext)s/%(_internal_name)s